Net+ pt2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

EUI-64

The two different variations of network address translation (NAT) include SNAT and ANAT.

False

True or False: The ipconfig utility is the TCP/IP configuration and management utility used on UNIX and Linux systems.

False

True or False: UDP provides error checking and sequencing.

False

UDP provides error checking, but not sequencing.

False

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing

Which Network layer protocol reports on the success or failure of data delivery?

IMCP

Which of the following is a technique designed to conserve the number of public IP addresses needed by a network?

NAT

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

Which of the following is not a task handled by a router?

A router forwards broadcasts over the network.

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

AAAA record

What is by far the most popular DNS server software available?

BIND

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Differentiated Services (DiffServ)

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

EIGRP

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

EIGRP may not be available on non-Cisco routers.

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

ipconfig /flushdns

What routing metric affects a path's potential performance due to delay?

latency

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

link local address

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

link-state protocols

What utility is the equivalent to the pathping command on a Linux system?

mtr

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

What command will list only current connections, including IP addresses and port numbers?

netstat -n

Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

netstat -s

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

ping

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

port 547

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

The three different types of port number ranges as defined by IANA include all of the following EXCEPT what type of port range?

public ports

You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?

show ip route

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

sliding-window

A technique in which a network administrator programs a router to use specific paths between nodes is known as which of the following?

static routing

What tcpdump command can be used to filter out all traffic except SSH traffic?

tcpdump port 22

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

The Border Gateway Protocol is considered to be a hybrid routing protocol.

True

The Class E IPv4 address range is not available for general use because Class E addresses, which begin with 240 through 254, are reserved for research.

True

The Linear Pathway Protocol is the only current exterior gateway protocol, and has been dubbed the "protocol of the Internet."

True

The TTL field indicates the maximum duration that the packet can remain on the network before it is discarded.

True

The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.

True

The two types of DNS requests include recursive query and iterative query.

True

True or False: Every host on a network is assigned a unique character-based name called the fully qualified domain name.

True

UDP port 123 is utilized by the Network Time Protocol service.

True

When using IPv6, two or more nodes on the same link are said to be neighbors.

True

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.

False

Routing paths are determined by either static routing or dynamic routing.

True

The pathping utility sends 10 pings per hop by default.

False

Which of the following is NOT a range of IP addresses recommended for use in private networks?

127.0.0.0 through 127.255.255.255

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

IPv6 addresses are composed of ____ bits.

128

In the classful addressing scheme, what range of network addresses is considered a Class B?

128.0.x.y to 191.255.x.y

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

By default, what is the MTU size on a typical Ethernet network?

1500 bytes

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

1522 bytes

Which of the following IPv6 addresses represents a global unicast address?

2000::/3

HTTP uses which port number for requests between web servers and web clients?

80

The 1024 - 65535 range of ports is also known as the "well-known" range.

False

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for?

An IS-IS capable network router.

Which of the following is a correct statement?

An anycast address can identify multiple destinations, with packets delivered to the closest destination.

Which of the following routing protocols are used by border routers and exterior routers to distribute data outside of an autonomous system?

BGP

Which statement regarding the Border Gateway Protocol (BGP) is accurate?

BGP utilizes TCP for communicating updates.

The CTRL + S key combination can be used to stop an actively running command.

False

What occurs when a collision happens on a network?

Each node on the network waits a random amount of time and then resends the transmission.

A hexadecimal number is a number written in the base 10 number system.

False

ARP tables might contain two different types of entries, multi-variable and functional.

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

False

DNS follows a centralized database model, allowing for easier management of DNS records.

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

False

IPv4 and IPv6 use the same packet format.

False

Neighbor Discovery Protocol is less resistant to hacking attempts than ARP.

False

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.

False

TCP uses a four-step process called a four-way handshake to establish a TCP connection.

False

What is the purpose of the checksum TCP field?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

What does the MX record do in a forward DNS zone?

It identifies the e-mail server to be used for e-mail traffic for the domain

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

What statement regarding the Server Message Block protocol is accurate?

It is used by Windows and UNIX-based operating systems to share files.

What is the ARPA domain suffix utilized for?

It is used for reverse DNS queries, and holds PTR records.

At which layer of the OSI model is a packet encapsulated with its own header and trailer to create a frame?

Layer 2

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources.

The first 24 bits in a MAC address are known as which of the following?

OUI

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

On the DNS root servers.

Which of the following devices joins two or more networks and passes packets from one network to another?

Router

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

SIP

The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

A subnet mask is a 32-bit number that helps one computer find another.

TRUE

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

TXT record

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

MAC address spoofing is the impersonation of an MAC address by an attacker.

True

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address.

What happens when a router receives a packet with a TTL of 0?

The router drops the packet and sends an ICMP TTL expired message back to the host.

How do routers create a broadcast domain boundary?

They do not forward broadcast traffic.

TCP (Transmission Control Protocol) operates in which layer of the OSI model?

Transport

A port is a number assigned to a process, such as an application or a service, that can receive data. A socket consists of both a host's IP address and a process's TCP or UDP port, with a colon separating the two values.

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

True

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.

True

In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.

True

ARP relies on _____, which transmits simultaneously to all nodes on a particular network segment.

broadcasting

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____or application switches.

content switches

The _____ is the gateway device that nodes on the network turn to first for access to the outside world.

default gateway

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

dig @8.8.8.8 mycompany.com MX

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

flow label

Which type of DNS server is an optional server that receives queries from local clients but doesn't work to resolve the queries?

forwarding DNS server

Which of the following routing metrics is a measure of the number of network segments crossed?

hop count

The MTU for the network can be as high as 9198 bytes.

hop limit

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

The last part of an FQDN is called the _______.

top-level domain

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

traceroute -I srv1.mycompany.com

An organization might utilize any of the following common types of DNS server configurations EXCEPT what server configuration?

tracking DNS server

What text editor can be used on Linux to view and edit the contents of a configuration file?

vim

What command can be used to check a domain computer's time source from a Command Prompt window?

w32tm /query /source

When a secondary DNS server needs to update its database, it makes a request to the primary server. This process is known as which of the following?

zone transfer


Ensembles d'études connexes

Organizational Behavior Mid-term

View Set

Chapter 6- Entrepreneurship & Starting a Small Business

View Set

Federal Government Chapter 9 Quiz

View Set

Q4 Ch 17 Principles of Inflammation & Immunity

View Set

IV, IM, PO Advantages/Disadvantages

View Set